Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
394
result(s) for
"adversaries"
Sort by:
Space, Time, and Theology in the Leibniz-Newton Controversy
2013,2006
In the famous Correspondence with Clarke, which took place during the last year of Leibniz's life, Leibniz advanced several arguments purporting to refute the absolute theory of space and time that was held by Newton and his followers.
The main aim of this book is to reassess Leibniz's attack on the Newtonian theory in so far as he relied on the principle of the identity of indiscernibles. The theological side of the controversy is not ignored but isolated and discussed in the last three chapters, which deal with problems connected with the notions of omnipotence and omniscience.
Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing
2019
Achieving high source location privacy is critical when Wireless Sensor Networks (WSNs) are used in sensitive applications such as in asset or battlefield monitoring. Due to the sensitivity of information in these applications, it is important to ensure the flow of data between sensor nodes is secure and it does not expose any information about the monitored assets to an adversary. This paper proposes a routing scheme with stronger source location privacy than the privacy of traditional routing schemes. The paper addresses some limitations of four existing schemes by providing highly random routing paths between the source nodes and sink node. The scheme randomly sends packet to the sink node through tactically positioned proxy nodes to guarantee the routes are highly befuddling to the adversary. To achieve high privacy, the proposed scheme uses a randomizing factor to generate a new random route for every successive packet. Simulation results demonstrate that the proposed scheme provides longer safety period and stronger privacy to outperform other schemes. Furthermore the scheme provides stronger privacy against both, patient and cautious adversary models.
Journal Article
G G Attack: General and Geometry-Aware Adversarial Attack on the Point Cloud
2025
Deep neural networks have been shown to produce incorrect predictions when imperceptible perturbations are introduced into the clean input. This phenomenon has garnered significant attention and extensive research in 2D images. However, related work on point clouds is still in its infancy. Current methods suffer from issues such as generated point outliers and poor attack generalization. Consequently, it is not feasible to rely solely on overall or geometry-aware attacks to generate adversarial samples. In this paper, we integrate adversarial transfer networks with the geometry-aware method to introduce adversarial loss into the attack target. A state-of-the-art autoencoder is employed, and sensitivity maps are utilized. We use the autoencoder to generate a sufficiently deceptive mask that covers the original input, adjusting the critical subset through a geometry-aware trick to distort the point cloud gradient. Our proposed approach is quantitatively evaluated in terms of the attack success rate (ASR), imperceptibility, and transferability. Compared to other baselines on ModelNet40, our method demonstrates an approximately 38% improvement in ASR for black-box transferability query attacks, with an average query count of around 7.84. Comprehensive experimental results confirm the superiority of our method.
Journal Article
The resistance : the dawn of the anti-Trump opposition movement
by
Meyer, David S., editor
,
Tarrow, Sidney G., editor
,
Hacker, Jacob S., writer of afterword
in
Trump, Donald, 1946- Adversaries.
,
Protest movements United States History 20th century.
,
Opposition (Political science) United States.
2018
\"Even before the 2016 presidential election took place, opponents of a Trump presidency took to the streets. The protests intensified after Trump took office. Over time, the Resistance was joined by a broad variety of groups and embraced an increasing diversity of tactics. The Resistance details the emergence of a volatile and diverse movement directed against the Trump presidency\"-- Provided by publisher.
Privacy Preservation in Smart Meters: Current Status, Challenges and Future Directions
by
Kua, Jonathan
,
Xiang, Yong
,
Hossain, Mohammad Belayet
in
adversaries
,
Alternative energy sources
,
Communication
2023
Recent years have seen the rapid development of technologies in Smart Grids (SGs) to enhance electricity networks with digital and data communication technologies. SGs can proactively detect, react, and respond to dynamic changes in the network. SGs can also enhance the efficiency and reliability of electricity supplies and promote the integration of renewable energy sources. Smart Meters (SMs) are often seen as the first step to a successful implementation of SGs. While SMs enable Utility Providers and consumers to obtain near real-time information of energy consumption, they can also be exploited to infer sensitive consumer data. Therefore, privacy preservation in SMs is paramount in ensuring the widespread and successful deployment of SGs. In this paper, we present a comprehensive survey of the state-of-the-art SM privacy-preserving techniques published in the literature over the past decade. We categorize these techniques based on the attack types and their objectives. We aim to offer a unique perspective in this survey article through the lens of privacy preservation, cross-cutting the wide range of techniques presented in the literature. We conclude by identifying the challenges and highlighting key future research directions in the field.
Journal Article
Efficient and privacy-preserving location-based services over the cloud
by
Venkatesan, S.
,
Yadav, Vijay Kumar
,
Verma, Shekhar
in
Algorithms
,
Cloud computing
,
Communication
2022
The location-based services (LBS) scheme has become an essential part of people’s daily life, and it is widely used in various industries and cloud server applications. In LBS, users send the query regarding their current location to the cloud server. The cloud server collects the data related to the nearest hospital, restaurant, etc., corresponding to the received users’ query and sends them. If the cloud server is malicious, it may reveal sensitive information about the user. Therefore, users may hesitate to share their queries with the cloud server. Moreover, the cloud server wants to monetize its services, and it only provides data to the user for a prescribed fee. Hence, simultaneously achieving users’ query privacy and cloud server’s data privacy is an important goal in LBS. Existing LBS schemes have restrictions that they cannot simultaneously achieve these types of privacy at low computation costs. This work proposes three LBS schemes using the oblivious transfer (OT) protocol. The first LBS scheme provides user’s query privacy (in the presence of semi-honest cloud server) and cloud server’s data privacy; the other two provide user’s query privacy (in the presence of malicious cloud server) and cloud server’s data privacy. All the proposed schemes require significantly less exponentiation and modulus operations than existing LBS schemes. Experimental results showed that the proposed schemes required less execution time on average than the existing LBS schemes.
Journal Article